CVE-2023-47124

Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.0.0:beta4:*:*:*:*:*:*

History

07 Dec 2023, 21:01

Type Values Removed Values Added
References () https://doc.traefik.io/traefik/https/acme/#tlschallenge - () https://doc.traefik.io/traefik/https/acme/#tlschallenge - Product
References () https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5 - () https://github.com/traefik/traefik/releases/tag/v3.0.0-beta5 - Release Notes
References () https://github.com/traefik/traefik/releases/tag/v2.10.6 - () https://github.com/traefik/traefik/releases/tag/v2.10.6 - Release Notes
References () https://github.com/traefik/traefik/security/advisories/GHSA-8g85-whqh-cr2f - () https://github.com/traefik/traefik/security/advisories/GHSA-8g85-whqh-cr2f - Third Party Advisory
References () ttps://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/ - () ttps://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/ - Broken Link
References () https://doc.traefik.io/traefik/https/acme/#dnschallenge - () https://doc.traefik.io/traefik/https/acme/#dnschallenge - Product
References () https://doc.traefik.io/traefik/https/acme/#httpchallenge - () https://doc.traefik.io/traefik/https/acme/#httpchallenge - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
CPE cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*
First Time Traefik traefik
Traefik

04 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-04 21:15

Updated : 2023-12-10 15:26


NVD link : CVE-2023-47124

Mitre link : CVE-2023-47124

CVE.ORG link : CVE-2023-47124


JSON object : View

Products Affected

traefik

  • traefik
CWE
CWE-772

Missing Release of Resource after Effective Lifetime